Sciweavers

116 search results - page 11 / 24
» Secure Role-Based Workflow Models
Sort
View
AINA
2007
IEEE
14 years 4 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
IFIP
2009
Springer
13 years 7 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
SACMAT
2003
ACM
14 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ICDIM
2007
IEEE
14 years 4 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
AINA
2007
IEEE
14 years 1 months ago
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows
Current scientific workflow models require datasets to be transferred from their source to the hosts where they can be processed. This seriously impedes data-intensive application...
Zijiang Yang, Shiyong Lu, Ping Yang